Please turn on your JavaScript for this page to function normally.
Password management done right

David Sancho, senior threat researcher with Trend Micro, has recently written a short but good post in which he pointed out the reasons why despite their inherent insecurity, …

Tips for utilities to comply with new cybersecurity standards

When the North American Electric Reliability Corporation (NERC) signed Order 791 in January 2014, more than 400 utilities suddenly faced a tight timetable to plan for and …

How to learn information security

Learning is a skill. A skill that can be, well, learned. I am often approached by young people who ask me what does it take to move into the information security field, what …

Six infosec tips I learned from Game of Thrones

In Westeros—the land of dark knights, backstabbing royals, dragons, wildings, wargs, red witches, and White Walkers—even the youngest ones have to learn basic self-defense …

Passwords: Real-world issues, tips and alternatives

Per Thorsheim is an independent information security adviser based in Norway. He is the founder and main organizer of PasswordsCon, the first and only international conference …

Working to accomplish compliance and security

Organizations have until January 2015 to meet the new requirements of the PCI Data Security Standard version 3.0. Businesses need to ensure that compliance is cyclical and …

Learning from others

The old saying “one man’s misfortune is another man’s gain” is eminently applicable in the information security industry. When an organization becomes …

How can we create a culture of secure behavior?

It’s a busy day in your company and everyone is rushing around trying to respond to requests. Audrey gets an email that looks like it’s from a partner asking her …

Identifying security innovation strategies

Tom Quillin is the Director of Cyber Security Technology and Initiatives at Intel Corporation. In this interview he talks about security innovation, current and future …

Securing mobile applications

In this interview, Dan Cornell, Principal of Denim Group, talks about the most common pitfalls of securing mobile applications, discusses the challenges involved in performing …

Compliance misconceptions, challenges and tips

In this interview, Paul Koziarz, President and General Manager of Regulatory Compliance at CSI, talks about the misconceptions related to compliance, provides advice for CSOs …

Best practices for secure use of Windows XP

Microsoft’s support for Windows XP ended yesterday, April 8, 2014. However, Gartner estimates that one-third of enterprises currently have more than 10 percent of their …

Don't miss

Cybersecurity news